Hackers Manipulate GitHub Search To Deliver Clipboard-Hijacking Malware

0
[ad_1]

In a sophisticated cyberattack campaign uncovered on April 10, 2024, cybercriminals are exploiting GitHub’s search functionality to distribute a particularly insidious form of malware, known as “Keyzetsu clipper,” targeting cryptocurrency wallets.

This new wave of attacks highlights cybercriminals’ evolving tactics and raises significant concerns over the security of open-source supply chains.

The attackers have ingeniously crafted repositories with popular names and topics, employing automated updates and fake popularity metrics to manipulate GitHub’s search rankings.

Manipulate GitHub Search

This manipulation ensures their malicious repositories appear at the top of search results, deceiving unsuspecting users into downloading malware-laden code.

The Mechanics Of The Attack

The core of this attack lies in manipulating GitHub’s search functionality.

According to the Checkmarx report, attackers make it challenging for users to distinguish between benign and malicious code by creating repositories that mimic legitimate projects, often related to popular games, cheats, or tools.

These repositories are designed to appear more credible and attractive to potential victims by leveraging GitHub Actions for automatic updates, which boosts their visibility in search results.

One of this campaign’s most alarming aspects is the use of Visual Studio project files (.csproj or .vcxproj) to conceal the malicious code.

Manipulate GitHub Search

This code is crafted to automatically execute when the project is built, making detection even more challenging.

Furthermore, the attackers have prepared the malware to modify its payload based on the victim’s geographic location, although this functionality was not activated at the time of discovery.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

The Threat Of “Keyzetsu Clipper”

The malware at the heart of this campaign, dubbed “Keyzetsu clipper,” is designed to hijack the clipboard of infected Windows machines.

This allows the malware to replace cryptocurrency wallet addresses copied to the clipboard with addresses controlled by the attackers, effectively diverting cryptocurrency transactions to their wallets.

The malware establishes persistence on the infected machines, ensuring its continued operation even after rebooting the system.

This attack underscores the vulnerabilities inherent in the open-source supply chain, particularly the reliance on platforms like GitHub for code sharing and collaboration.

The clever manipulation of GitHub’s search functionality to distribute malware represents a significant escalation in the sophistication of cyberattacks targeting developers and the broader open-source community.

In response to these findings, cybersecurity experts are urging developers and users to exercise increased vigilance when downloading code from GitHub.

Recommendations include verifying the authenticity of repositories, scrutinizing project files for unusual code, and employing robust security solutions capable of detecting and neutralizing such threats.

As the cyber threat landscape continues to evolve, the discovery of this campaign serves as a stark reminder of the need for constant vigilance and proactive security measures within the open-source ecosystem.

The collaborative nature of open-source development, while one of its greatest strengths, also presents unique challenges in safeguarding against such sophisticated and deceptive attacks.

In conclusion, the manipulation of GitHub search to distribute clipboard-hijacking malware marks a significant development in cybercriminal tactics, highlighting the ongoing battle between attackers seeking to exploit digital platforms and the cybersecurity community’s efforts to protect them.

Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free 


[ad_2]
Source link

Analyzing Bitcoin Price Trends and Crypto Scalping Methods

0
[ad_1]
Analyzing Bitcoin Price Trends and Crypto Scalping Methods

Are you interested in cryptocurrency trading but unsure where to start? Have you heard about crypto scalping but don’t quite understand how it works? One fact worth mentioning is that crypto scalping involves making multiple trades over short periods, aiming to profit from small price gaps.

In this blog post, we’ll explore the world of analyzing Bitcoin price trends and delve into the strategies of crypto scalping. So, if you’re ready to learn about profitable trading opportunities and effective methods for short-term gains, keep reading!

Key Takeaways

  • Crypto scalping is a fast-paced trading strategy that involves making many trades within a day. It targets small price changes to make quick profits.
  • Traders use technical and fundamental analysis to identify trading opportunities in Bitcoin and other cryptocurrencies. These analyses help in predicting future price movements.
  • Tools like technical indicators, real-time market data feeds, and automated trading bots are crucial for successful crypto scalping. They aid traders in making informed decisions quickly.
  • There are several strategies for crypto scalping such as time-based, range-bound, breakout, news-based, and volume-based strategies. Each has its way of identifying profitable trade opportunities.
  • Understanding the risks involved in crypto scalping, like high fees and the need for constant monitoring, helps traders manage their trades better. Using stop-loss orders can minimize potential losses during volatile market conditions.

Understanding Crypto Scalping

Crypto scalping is a quick, short-term trading strategy used in the cryptocurrency market. Traders aim to make small profits from minor price changes. They do this by entering and exiting trades quickly over a short period.

This method relies on technical analysis and tools to find good trade opportunities.

In crypto scalping, traders often use 5-minute or 1-minute strategies to take advantage of fast-moving prices. They make many trades within a day, hoping to profit from slight price differences each time.

Scalpers need to be skilled in using various indicators and bots that help them decide when to buy and sell for small but frequent gains.

Benefits and Risks

Crypto scalping is a popular strategy used by traders to make profits from small price movements in the digital currency market. This method involves making quick, frequent trades to capture gains from slight price differentials.

Benefits:

  1. Quick Profits: Traders can earn from minor changes in cryptocurrency prices, often within minutes or hours. This makes for a fast-paced investment opportunity.
  2. Lower Risk: Since each trade targets small movements, the risk associated with each transaction is reduced compared to more significant investments.
  3. High-Volume Trading: Engaging in many trades throughout the day increases the profit potential.
  4. Market Learning: Scalpers become highly knowledgeable about market trends and trading indicators due to constant monitoring.
  5. Use of Tools: Various crypto scalping indicators and bots enhance trading effectiveness, allowing for better decision-making.

Risks:

  1. Requires Constant Monitoring: Traders must stay glued to their screens, watching for market shifts to make timely trades.
  2. High Fees: Frequent trading can lead to higher transaction costs, eating into profits.
  3. Stressful: The need for quick decisions and continuous market analysis can be mentally draining.
  4. Technical Reliance: Over-dependence on technical analysis tools may overlook broader market trends or news that impact prices.
  5. Margin of Error: Small mistakes can quickly add up, especially when leveraging positions, leading to significant losses.
  6. Skill Level: Successful scalping demands high expertise in reading market indicators and swift decision-making skills.

By understanding these benefits and risks, traders can better navigate the volatile waters of short-term crypto trading and potentially secure investment opportunities with informed strategies.

Analyze Bitcoin price trends through technical and fundamental analysis to make informed trading decisions. Explore the world of short-term trading strategies in cryptocurrency markets for better investment outcomes.

Technical and Fundamental Analysis

Crypto scalping relies on both technical and fundamental analysis to identify profitable trading opportunities. Technical analysis involves studying historical price data, identifying patterns, and using indicators like moving averages and RSI to predict future price movements.

On the other hand, fundamental analysis focuses on evaluating the intrinsic value of a cryptocurrency by examining factors such as its technology, adoption rate, the team behind it, and utility in real-world applications.

Combining these analyses helps traders gain a comprehensive understanding of market trends and make informed decisions when executing crypto scalping strategies.

Choosing the Right Cryptocurrencies

When choosing the right cryptocurrencies for scalping, consider those with high liquidity and volatility. Look for digital assets that have a history of swift price movements and small differentials, allowing for frequent trading opportunities.

Analyze the market trends and focus on cryptocurrencies with sufficient trading volume to ensure easy entry and exit from positions. Also, prioritize coins with strong fundamental backing, such as robust blockchain technology and active community support, as these factors can underpin long-term value stability.

Selecting the right cryptocurrencies for scalping involves recognizing patterns in price movements over short periods. Targeting digital currencies known for their rapid shifts can enhance the effectiveness of your short-term trading strategy.

Crypto Scalping Methods

Explore different strategies and tools for crypto scalping to stay ahead in the ever-changing crypto market. Read more about it!

Different Strategies

  1. Time-based Scalping: This strategy involves making quick trades based on specific time intervals, such as 1-minute or 5-minute charts, to capitalize on rapid price movements.
  2. Range-bound Scalping: Traders using this method focus on buying at support and selling at resistance within a defined price range to capture small profits repeatedly.
  3. Breakout Scalping: This approach involves identifying key resistance or support levels and entering trades when the price breaks out, aiming to profit from the ensuing momentum.
  4. News-based Scalping: Traders monitor news and events that could impact cryptocurrency prices and quickly enter and exit positions to take advantage of short-term market reactions.
  5. Volume-based Scalping: This strategy involves analyzing trading volumes to identify periods of increased activity, allowing traders to capitalize on short-term price fluctuations driven by high trading volumes.

Exploring Cryptocurrency Investment Strategies

Tools for Scalping

Crypto scalping tools are essential for executing successful short-term trading strategies. Here are the key tools for effective crypto scalping:

  1. Technical Indicators: Implementing technical indicators like moving averages, RSI, MACD, and Bollinger Bands can help identify potential entry and exit points with precision.
  2. Order Book Analysis: Utilizing order book data to gauge market depth and liquidity can aid in making informed trading decisions based on market sentiment.
  3. Price Action Patterns: Monitoring candlestick patterns and chart formations can provide valuable insights into short-term price movements, aiding in identifying profitable opportunities.
  4. Real-time Market Data Feeds: Accessing real-time market data feeds from reliable sources enables traders to stay updated on cryptocurrency price fluctuations and make timely decisions.
  5. Automated Trading Bots: Leveraging advanced trading bots designed for scalping can help execute trades swiftly and efficiently based on predefined parameters, allowing for continuous market monitoring.
  6. Stop-Loss Orders: Implementing stop-loss orders helps minimize potential losses by automatically closing positions at predetermined prices, mitigating risks associated with volatile price swings.
  7. Volatility Tracking Tools: Utilizing volatility tracking tools allows traders to identify periods of heightened price fluctuations, enabling them to capitalize on short-term trading opportunities during such market conditions.
  8. News Aggregators: Keeping track of cryptocurrency news through reliable aggregators empowers traders to stay informed about industry developments that could impact short-term price movements.
  9. Execution Platforms: Using robust trading platforms with low latency execution ensures rapid order processing, crucial for capitalizing on fleeting price differentials in volatile markets.
  10. Risk Management Tools: Employing risk management calculators and position sizing tools facilitates maintaining a disciplined approach to managing capital and minimizing exposure to potential losses during scalping activities.

Understanding these essential tools is critical for effectively navigating the complexities of crypto scalping strategies in the ever-evolving digital assets realm.

Conclusion

In conclusion, understanding Bitcoin price trends and mastering crypto scalping methods can lead to profitable trading. Analyzing price movements and using effective strategies are crucial in this ever-evolving digital asset realm.

Traders who leverage short-term trading techniques and low-risk strategies can capitalize on small price differentials for successful trades. With the right tools and skills, navigating the complexities of cryptocurrency trading can be rewarding.

  1. 6 of the Best Crypto Bug Bounty Programs
  2. 5 Types of Crypto You Didn’t Know Existed
  3. ETH Exchange Rate Expectations for 2023-2025
  4. Step-by-Step Guide to Creating Your First Crypto Wallet
  5. 5 Best Crypto Marketing Agencies for Web3 Security Brands

[ad_2]
Source link

Google Maps update brings Android’s system share sheet

0
[ad_1]

Google Maps is switching from a custom share sheet to the native Android solution. The latest update for the app released earlier this week brings a new share sheet. The company previously dropped its custom share sheet from Chrome and Photos.

Google Maps updated with Android’s native share sheet

Google, the developer of the Android operating system, offers dozens of first-party apps for Android devices. Some come bundled with the OS, while others are available to download from the Play Store. Interestingly, all of the apps don’t share the same design language. The YouTube family of apps, for example, has a different design language.

Many first-party Google apps also use a custom share sheet. The company has been moving them to the native version lately. Google Maps is the latest to make the switch. As spotted by 9to5Google, version 11.122 of the navigation app comes with the Android share sheet, ditching its custom solution for a more uniform and consistent look.

Previously, the share button in Google Maps pulled up a full-screen UI with a close button at the top left corner. Your profile picture, name, and email address appeared below as part of a “Sharing as” indicator. The bottom sheet featured a “To” section where you could quickly type a name, phone number, or email to find a contact. Below it was a carousel of Suggestions, followed by app shortcuts, including Copy and More buttons.

With the latest update, Google Maps gets Android 14‘s system share sheet. It isn’t a full-screen UI, meaning the “Sharing as” indicator at the top is gone, and so is the close button. The link you are sharing appears at the top of the sheet, complete with the place’s name and an image. Suggested contacts and apps appear below. As said earlier, Google Chrome and Google Photos have also picked up a similar change.

Google Maps Android share sheet 1

The update is rolling out via the Google Play Store

Version 11.122 of Google Maps is now rolling out via the Google Play Store. However, the change seems to be enabled with a server-side update. The new version doesn’t yet bring the updated share sheet on our devices. You can check on your device after installing the update. The share button is also now placed more prominently at the top when you are viewing a full listing on Google Maps. It appears next to the search icon. This makes sharing locations easier.

Google Maps Android share sheet 2


[ad_2]
Source link

New Google Wallet app shortcuts to let Android users add cards to the home screen

0
[ad_1]
Recently, Google has been beefing up its Wallet app with some cool new features. Now, you can add your tickets and passes straight from Gmail or use your bank card to pay for public transit without needing ID verification. And guess what? It’s about to get even easier and faster to choose which card you want to pay with.According to 9to5Google, Google Wallet for Android is now rolling out support for app shortcuts. This nifty feature allows you to place your credit and debit cards directly on your home screen for quick access.

Once this update hits your device, simply long-pressing on Google Wallet will unveil app shortcuts for your saved credit and debit cards. These shortcuts display a picture of the card along with details like the credit card network and the last four digits.

Similar to any other app shortcut, you can easily drag it to a spot on your home screen to create a permanent icon. This grants you one-tap access to the card, opening up the card page with a larger view and a list of recent activity.

These card shortcuts haven’t been widely rolled out just yet, but they are discoverable in version 24.12.x of Google Wallet following a server-side update. Make sure you also have the latest Google Play services (24.10.17) installed to take advantage of this feature.

If you are someone who frequently switches between cards, this feature could be a real time-saver. Instead of having to first open Wallet and then navigate through the in-app carousel, you can now simply access your cards directly from the home screen.

The Wallet app is quite useful because you can add not just bank cards but also passes for things like travel, concerts, or any other events. Google Wallet has even started supporting driver’s licenses and digital IDs in some US states, and more are expected to hop on board soon.

[ad_2]
Source link

CISA Opens its Internal Malware Analysis System for Public Use

0
[ad_1]

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its latest initiative: opening its advanced malware analysis system, Malware Next-Gen, to the public.

Malware Next-Gen represents a paradigm shift in analyzing and countering cyber threats and malware.

With scalability and efficiency in mind, this next-generation platform allows governmental bodies, private organizations, security researchers, and individuals to submit malware samples and suspicious artifacts for comprehensive analysis.

Eric Goldstein, CISA’s Executive Assistant Director for Cybersecurity, emphasized the importance of this initiative, stating, “Effective and efficient malware analysis helps security professionals detect and prevent malicious software from enabling adversary access to persistence within an organization.”

He emphasized that the Malware Next-Gen is evidence of CISA’s dedication to improving the country’s cybersecurity position.

Malware Next-Gen is engineered to automate the analysis of newly identified malware, providing timely, actionable intelligence crucial for network defenders in conducting cyber incident responses or threat hunts.

The platform can provide advanced and dependable analysis and can be scaled to meet future workload requirements.

Document
Stop Advanced Phishing Attack With AI

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

One of the standout features of Malware Next-Gen is its multilevel containment capabilities, which allow for the automatic analysis of potentially malicious files or URLs.

This integrated system equips CISA analysts and the operations community with the tools necessary to respond rapidly and effectively to evolving cyber threats and safeguard critical systems and infrastructure.

Empowering Partnerships and Enhancing Defense

With the aim of creating a collaborative environment among partners to share information and insights into cyber threats, CISA has opened Malware Next-Gen to the public.

This initiative not only facilitates the enrichment and correlation of data but also supports the rapid dissemination of cyber threat insights, ultimately enhancing the collective defense against cyber adversaries.

Also, you can see how Sandbox is like ANY.RUN can benefit your organization. You can get free access for your security team.

All organizations, security researchers, and individuals are encouraged to register and submit suspected malware into this automated system for analysis.

This collaborative approach is expected to significantly contribute to the detection, prevention, and mitigation of cyber threats, reinforcing the security of national and global digital infrastructure.

For more information on how to participate in this initiative, visit CISA’s official website.

The launch of Malware Next-Gen for public use is a pivotal moment in the fight against cyber threats.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.


[ad_2]
Source link

Motorola Edge 50 Ultra paid a visit to Geekbench ahead of launch

0
[ad_1]

The Motorola Edge 50 Ultra just surfaced on Geekbench, one of the best-known benchmarking tools. This smartphone will launch on April 16, in case you were unaware. We’ve also exclusively leaked it a while back.

The Motorola Edge 50 Ultra appeared on Geekbench less than a week before launch

That being said, the Motorola Edge 50 Ultra managed to score 1,947 points in the single-core, and 5,149 points in the multi-core test on Geekbench. That is in line with what we’d expect from the Snapdragon 8s Gen 3.

Motorola Edge 50 Ultra Geekbench

That is the chip that will fuel the device, of course. Now, Geekbench also shows that the phone will feature 12GB of RAM and ship with Android 14 out of the box. There is a chance a 16GB RAM model will also be available, though.

Motorola will almost certainly utilize LPDDR5X RAM and UFS 4.0 flash storage for this phone. We’re also expecting a 50-megapixel main camera to be included. It will be backed by an ultrawide camera and a periscope telephoto camera with 3x optical zoom.

It will feature a curved display, and thin bezels

The device will feature a curved display with very thin bezels. Its camera will be located in the display itself, centered towards the top. The phone will come in both glass and vegan backplate options, it seems.

Its cameras will sit in the top-left corner. The main and ultrawide units will sit in the first row, while the periscope telephoto unit will be located in the second row, along with an LED flash and some other sensors.

This will be the most powerful smartphone Motorola will announce this year. Well, at least that’s what we’re expecting will happen. It will, for sure, become the company’s new flagship handset.

We still don’t have a full picture as to what its specs will look like. The phone’s pricing is also a mystery at this point. Everything will be revealed on April 16, though.


[ad_2]
Source link

The New York Times to use automated voices to read articles

0
[ad_1]

Right now, the New York Times is in a heated legal battle against Microsoft and OpenAI. While that is the case, that’s not to say that the publication is against AI technology in general. According to a new report, the New York Times is planning on using automated voices to narrate its articles.

The legal battle is still going on, as the New York Times claims that scraping its articles constitutes copyright infringement. Right now, we’re still waiting for the results of this case. The results of the case could have major implications for AI companies going forward.

The New York Times will use automated voices for its articles

The New York Times is one of the biggest publication companies in the U.S., and it’s looking to further extend its appeal to more users. We all have to admit that not everyone wants to sit still and read long articles. This is why the company publishes audio recordings of its articles.

So far, the company actually published more than 2,300 audio recordings in 2023, and this includes podcasts. We can’t argue with the convenience of being able to casually listen to an article while getting ready for work or cleaning rather than reading it.

This is why the company is looking to take this a step further. The New York Times will use automated voices to narrate its articles. Starting this week, people who use the news app and audio app will be able to use voice narration to listen to their articles. This is going to be a gradual rollout because about 10% of its users will gain access initially.

Since these are automated voices, they don’t require a human contributor to read and record the audio. We’re not sure what AI platform the New York Times contacted for this automated voice. However, we do know that narrations will be available in about 75% of articles that the publication has published. That will make a ton of articles more accessible to users. It has plans to expand it to all of its articles at some point.

Limitations

If you’re not logged in to the New York Times website/app or if you have not subscribed, you will not have access to unlimited voices. Also, Android users will not be able to use this feature for the time being. It’s currently only available to people using devices from Apple. However, the company plans to bring this functionality to everyone over time.


[ad_2]
Source link

Google’s new Gemini AI model can now listen directly to audio files

0
[ad_1]

Okay, so for the past year and a half we’ve witnessed the rapid growth of generative AI (is it taking over the world?) and AI models are gaining more and more knowledge as we speak. Now, Android Headlines reports that Google’s new AI model, Gemini 1.5 Pro can now listen to audio.

Gemini can now listen to and understand audio files


Maybe you know but the more data you feed AI, the better it becomes (and freakier, if you’re one of the more skeptical people). At first, the training of the AI models was basically done via text – especially important for chatbots. However, AI models then learned to process image data, and can now be used to reconstruct an image (or create a whole new image upon your prompt). Gemini (which used to be called Bard for those of you who don’t know) has been able to process images, and now it’s growing towards audio format. The version that does that, Gemini 1.5 Pro, is currently in testing. This opens up a world of possibilities – like summaries of a long keynote, conversation, earnings call, lectures, and similar things. You’ll be able to upload the file to Gemini.

Tools to summarize long calls exist. But what they do is transcribe the call first and then summarize it. However, Gemini will listen to the call.

Don’t be quick to get excited though – for now, this won’t be available as a public release. For you to use it, you will need Google’s development platform Vertex AI or if you’re using AI Studio. It’s bound to make it to the public as well, but we don’t know when. All in all, witnessing the growth of AI is seriously exciting. If you’re one of the people who fear it will rule the world one day – don’t be too scared. The way I see it – it’s here to make our lives easier and give us more space to fulfill our potential as intelligent and also intuitive and creative human beings. It will just ensure we won’t have to waste precious time with the boring stuff (like listening to a long earnings call, you know).

[ad_2]
Source link

Poisoning WebDAV+URL+LNK to Deliver Malicious Payloads

0
[ad_1]

WebDAV incidents simulate an offensive attack employing a WebDAV server to distribute malware to a client PC. Attackers store malicious payloads and attract users into downloading and executing them.

It then analyzes a real-world scenario involving AsyncRat/Purelogs malware to understand defense mechanisms using ANY.RUN interactive malware sandbox and discusses methods to detect such attacks, including the creation of detection rules. 

See how ANY.RUN can benefit your organization. You can get free access for your security team.

Successful connection to the attacker’s host

To simulate a client-side WebDAV exploit, they set up a Kali Linux attacker machine and a Windows target machine, then create an LNK shortcut that launches the calculator, upload it to a WebDAV server, and use a URL file as a proxy to initiate a download and execution on the target machine. 

The attack involves establishing network connectivity, creating malicious files, starting a WebDAV server, and executing the URL file on the target, successfully launching the calculator while logging a connection on the server.

Result of executing the command

An attacker uses a phishing email to deliver a malicious URL file, which links to a malicious LNK file hosted on a WebDAV server. When the user launches the URL file, the LNK downloads a malicious BAT file and executes it. 

Visualization of the execution chain 

The YARA rule identified the URL file, the YARA hunting rule detected the LNK file on disk, and the SIGMA rule recognized the specific command line used during execution. 

YARA Rule

The Suricata rule identified the network connection to the WebDAV server and by combining these detection methods, ANY.RUN effectively defends against WebDAV exploitation attacks.  

Blocking URL execution 

Defenders can block URL file execution attacks by blocking these files from running within Windows settings. Threat intelligence and analysis of detected artifacts aid in identifying the attack vector. 

Blocking URL Extension

Regular expressions on the command line or URL filters can be used to search for malicious patterns, while Suricata, a network security monitoring tool, can be employed to detect triggered rules that might indicate such attacks.

By implementing these methods, defenders can proactively prevent URL file execution attempts. 

SURICATA Rule

Researchers investigated client-side exploits that use WebDAV servers and LNK files to send malware. They made rules that looked for malicious URL/LNK files, strange activity on the command line, and connections to WebDAV servers.

Disabling LNK/URL execution in Windows settings can also be a preventative measure, which likely uses a threat analysis sandbox like ANY.RUN allows security professionals to analyze malware samples in a controlled environment. 

About ANY.RUN 

ANY.RUN’s flagship product is an interactive malware sandbox that helps security teams efficiently analyze malware. 

Every day, a community of 400,000 analysts and 3000 corporate clients use our cloud-based platform to analyze Windows and Linux threats. 

Integrate ANY.RUN Threat Intelligence in Your Organization: Contact Sales

Key advantages of ANY.RUN for businesses: 

  • Interactive analysis: Analysts can “play with the sample” in a VM to learn more about its behavior. 
  • Fast and easy configuration. Launch VMs with different configurations in a matter of seconds. 
  • Fast detection: Detects malware within roughly 40 seconds of uploading a file. 
  • Cloud-based solution eliminates setup and maintenance costs. 
  • Intuitive interface: Enables even junior SOC analysts to conduct malware analysis. 

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.


[ad_2]
Source link

DOJ’s blockbuster lawsuit against Apple gets a new judge

0
[ad_1]

Last month, the United States Department of Justice (DOJ) filed a massive lawsuit against Apple, accusing the company of anti-competitive business practices. Expected to be a lengthy courtroom battle spanning several years, the case has been reassigned to a new judge. US District Judge Julien Xavier Neals will preside over the case, a court filing has revealed. It was originally assigned to Judge Michael E. Farbiarz.

A new judge will preside over the DOJ’s lawsuit against Apple

According to a new court filing on Wednesday, April 10, Farbiarz’s recusal in the DOJ’s blockbuster lawsuit against Apple was necessary under the Code of Conduct for United States Judges. His “disqualification is mandatory and cannot be remitted by the parties,” an official order by Chief Judge Renee Marie Bumb states. As such, Neals will preside over this case and all related cases in the future.

The order doesn’t precisely explain why Farbiarz is ineligible to oversee the case. His recusal also seems to have come without any request from either party, Apple or the DOJ. However, the specific rule of the Code of Conduct for United States Judges mentioned in the filing — Canon 3(C)(1)(d) — a judge would be disqualified from overseeing a case if their “impartiality might reasonably be questioned.”

This suggests either Farbiarz or someone he is related to, like a family member, has a close connection or financial tie with this case. Neals seemingly has no potential conflict of interest over the matter. As such, he replaces Farbiarz as the judge of this blockbuster case. As Reuters noted, US President Joe Biden nominated both judges to the US District Court. Neals has served since 2021, while Farbiarz has served since last year.

The hearing will take place from a US District Court in New Jersey

Filed on March 21, the DOJ’s blockbuster lawsuit against Apple targets many products and services. The government agency has pointed out flaws in almost every business the company does. The complaint highlights anti-competitive business practices everywhere, from iPhones and Apple Watches to CarPlay, digital keys, and more. It also blames Apple for the failures of Amazon Fire Phone and Microsoft Windows Phone.

Unsurprisingly, Apple disagrees. It said the lawsuit is “wrong on the facts and the law” and threatens the principles that set its products apart in fiercely competitive markets. The company added that the lawsuit could affect its ability to create the kind of technology it offers to consumers. This case has all the ingredients to become a lengthy courtroom battle. The hearing will take place from a US District Court in New Jersey.


[ad_2]
Source link